合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

        代寫SCC.363、代做Java,c++設(shè)計程序

        時間:2024-02-11  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯



        202**024 ASSESSMENTS
        Undergraduate
        Individual Programming
        Assessment Weighting [30%]
        SCC.363 Security and Risk
        Academic Honesty and Integrity
        Students at Lancaster University are part of an academic community that values trust,
        fairness and respect and actively encourages students to act with honesty and integrity. It is
        a University policy that students take responsibility for their work and comply with the
        university’s standards and requirements- found in the Manual of Academic Regulations and
        Practice. By submitting their answers students will be confirming that the work submitted is
        completely their own. By submitting their answers the group of students will be confirming
        that the work submitted is that of the group. Academic misconduct regulations are in place
        for all forms of assessment and students may familiarise themselves with this via the
        university website:
        https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/manual-of-academic-regulations-and-procedures/
        Plagiarism
        Plagiarism involves the unacknowledged use of someone else’s work and passing it off as if it
        were one’s own. This covers every form of submitted work, from written essays, video
        vignettes, and coding exercises. However, deliberately plagiarism with the intent to deceive
        and gain academic benefit is unacceptable. This is a conscious, pre-meditated form of
        cheating and is regarded as a serious breach of the core values of the University. More
        information may be found via the plagiarism framework website. All coursework is to be
        submitted electronically and will be run through our plagiarism detection mechanisms.
        Please ensure you are familiar with the University's Plagiarism rules and if you are in any
        doubt please contact your module tutor.
        https://www.lancaster.ac.uk/academic-standards-and-quality/regulations-policies-andcommittees/principles-policies-and-guidelines/plagiarism-framework/
        General Guidance:
        This is an individual assessment that will count for 30% of your overall mark for this module.
        Learning objectives
        • Develop appreciation and understanding of security concepts.
        • Formulate troubleshooting methods to identify/solve problems.
        • Evaluate information to argue solution choices critically.
        • Effectively communicate ideas.
        Submission requirements
        Prepare and submit your coding solutions on Coderunner. For all coding solutions, you must
        use Python3. You can use modules from standard Python3 and cryptography.io. Your code
        should include appropriate comments explaining what you do and why. All implementations
        must be in Python3, and the cryptography.io library must be used for any cryptographyrelated functions (if needed). If you must consider padding in any task, you should use PKCS7.
        Your code should include appropriate comments explaining your solution.
        Example of the type of comments you SHOULD AVOID -- the comments don't explain the
        solution:
        def avalancheCalculator(string1, string2):
         # I hash the strings and generate the hexdigest values
         hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
         hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

         # I convert the hexdigest to integers
         int1 = int(hexstring1, 16)
         int2 = int(hexstring2, 16)
         # I XOR the integers
         intResult = int1 ^ int2

         # I return the 1's in the binary representation.
         return ( bin(intResult).count('1') )
        Examples of types of comments that provide adequate information – the comments explain
        the solution to the problem:
        def avalancheCalculator(string1, string2):
         # A solution to the problem is to xor the integer representation
         # of the two values and count in the resulting int the number of bits
         # having the value of 1.
         hexstring1 = hashlib.sha256(string1.encode()).hexdigest()
         hexstring2 = hashlib.sha256(string2.encode()).hexdigest()

         int1 = int(hexstring1, 16)
         int2 = int(hexstring2, 16)
         intResult = int1 ^ int2

         # The "1"s in the binary representation of the XOR operation
         # represent which bits from int1 and int2 are different.
         # This is due to applying the XOR operation. 0^1 = 1, 1^0 = 1
         # Counting the "1"s will provide how many bits differ
         return ( bin(intResult).count('1') )
        You have to upload the implementation of your functions on CodeRunner.
        Marking Guidelines:
        • You have to answer all three (3) tasks. Marks will be allocated based on the clarity of your
        solution, comments in the code, and correctness. More information is provided within the
        individual questions.
        • The name of functions, type/number of variables, and return values must follow the tasks’
        guidelines. Failing to adhere to this may result in not receiving marks.
        Deadline for submissions: Friday 16
        th February 16:00
        TASK 1
        --------
        You are provided with the ds_hash hash function. The function receives a
        finite message as input and produces a non-negative integer, which we
        consider to be the hash value of the given message.
        The size of input messages is fixed and always equals 64 bytes. Implement an
        appropriate attack to check if the hash function ds_hash is strong collision
        resistant. Your alphabet should include all lower-case and upper-case letters
        of the English alphabet and all numbers from 0 to 9.
        # -- START OF YOUR CODERUNNER SUBMISSION CODE
        # INCLUDE ALL YOUR IMPORTS HERE
        def ds_hash(message: str) -> int:
         hash_value = 0
         for ch in message:
         hash_value = (hash_value * 71) + ord(ch)

         return hash_value & 0x7FFFFFFF
        def myAttack() -> bool:
        # YOUR IMPLEMENTATION
        return # True or False
        # -- END OF YOUR CODERUNNER SUBMISSION CODE
        #You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
        as follows:
        # MAIN
        if __name__ == "__main__":
        print( myAttack() )
        Marking scheme: This task's weight is 35% for providing a valid attack and
        commenting on your code.
        TASK 2
        --------
        Implement an HMAC based on the RFC-2104 definition (Section 2). The RFC is
        available at the following link: https://www.rfc-editor.org/rfc/rfc2104
        Below is the extract from the RFC that describes how the HMAC can be
        implemented, and this is what you need to implement. The text is amended to
        provide specific information about the selected H cryptographic hash
        function, i.e., SHA256.
         The definition of HMAC requires a cryptographic hash function, which
         we denote by H, and a secret key K. In your implementation, assume H
         to be the SHA256 cryptographic hash function.
         We denote by B the byte-length of such blocks (B=64 for SHA256),
         and by L the byte-length of hash outputs (L=** for SHA256).
         The authentication key K can be of any length up to B, the
         block length of the hash function. Applications that use keys longer
         than B bytes will first hash the key using H and then use the
         resultant L byte string as the actual key to HMAC. In any case the
         minimal recommended length for K is L bytes (as the hash output
         length).
         We define two fixed and different strings ipad and opad as follows
         (the 'i' and 'o' are mnemonics for inner and outer):
         ipad = the byte 0x36 repeated B times
        opad = the byte 0x5C repeated B times.
         To compute HMAC over the data `text' we perform
         H(K XOR opad, H(K XOR ipad, text))
         Namely,
         (1) append zeros to the end of K to create a B byte string
         (e.g., if K is of length 20 bytes and B=64, then K will be
         appended with 44 zero bytes 0x00)
         (2) XOR (bitwise exclusive-OR) the B byte string computed in step
         (1) with ipad
         (3) append the stream of data 'text' to the B byte string resulting
         from step (2)
         (4) apply H to the stream generated in step (3)
         (5) XOR (bitwise exclusive-OR) the B byte string computed in
         step (1) with opad
         (6) append the H result from step (4) to the B byte string
         resulting from step (5)
         (7) apply H to the stream generated in step (6) and output
         the result
        The function's name has to be CustomHMAC and defined as follows.
        # -- START OF YOUR CODERUNNER SUBMISSION CODE
        # INCLUDE ALL YOUR IMPORTS HERE
        def CustomHMAC(key: bytes, text: str) -> str:
        # YOUR IMPLEMENTATION
        return # YOUR RESULT
        # -- END OF YOUR CODERUNNER SUBMISSION CODE
        #You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
        as follows:
        # MAIN
        if __name__ == "__main__":
         k = os.urandom(16) # k is <class 'bytes'>
         txt = "hello world!!!!" # txt is <class 'str'>

         print( CustomHMAC(k, txt) )
         # The output will be a string of hexadecimal values, e.g.: a51b … 35fa

        You can debug your code against the result from the following function:
        from cryptography.hazmat.primitives import hashes, hmac
        def HMAC_from_Cryptography(key: bytes, text: str) -> str:
         h = hmac.HMAC(key, hashes.SHA256())
         h.update(text.encode())
         signature = h.finalize().hex()

         return signature
        Marking scheme: This task's weight is 40%, which will be allocated equally
        for correctly implementing the steps and commenting on your code.
        TASK 3
        --------
        Using the AES-ECB encryptor from the cryptography.io module, implement the
        AES mode in Figure 1. You can instantiate an AES-ECB encryptor as follows:
        from cryptography.hazmat.primitives.ciphers import Cipher, algorithms,
        modes
        key = # SELECT AN APPROPRIATE KEY FOR AES
        cipher = Cipher(algorithms.AES(key), modes.ECB())
        encryptor = cipher.encryptor()
        Figure 1 - The figure describes a mode of AES for encrypting plaintext to ciphertext
        The function's name has to be CustomAESmode and defined as follows:
        # -- START OF YOUR CODERUNNER SUBMISSION CODE
        # INCLUDE ALL YOUR IMPORTS HERE
        def CustomAESMode(key: bytes, iv: bytes, plaintext: str) -> str:
        # YOUR IMPLEMENTATION
        return # THE CIPHERTEXT
        # -- END OF YOUR CODERUNNER SUBMISSION CODE
        #You can test your code in your system (NOT IN YOUR CODERUNNER SUBMISSION)
        as follows:
        # MAIN
        if __name__ == "__main__":
         key = bytes.fromhex("06a9214036b8a15b512e03d534120006")
         iv = bytes.fromhex("3dafba429d9eb430b422da802c9fac41")
         txt = "This is a text"

         print( CustomAESMode(key, iv, txt) )
         # The result using the above input should be:
        1827bfc04f1a455eb101b943c44afc1d
        Marking scheme: This task's weight is 25%, which will be allocated equally
        for correctly implementing the steps and commenting on your code.
        如有需要,請加QQ:99515681 或WX:codehelp

        掃一掃在手機(jī)打開當(dāng)前頁
      1. 上一篇:代做CA3 Group程序、Java編程設(shè)計代寫
      2. 下一篇:CS170程序代做、Python編程設(shè)計代寫
      3. 無相關(guān)信息
        合肥生活資訊

        合肥圖文信息
        急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計優(yōu)化
        急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計優(yōu)化
        出評 開團(tuán)工具
        出評 開團(tuán)工具
        挖掘機(jī)濾芯提升發(fā)動機(jī)性能
        挖掘機(jī)濾芯提升發(fā)動機(jī)性能
        海信羅馬假日洗衣機(jī)亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
        海信羅馬假日洗衣機(jī)亮相AWE 復(fù)古美學(xué)與現(xiàn)代
        合肥機(jī)場巴士4號線
        合肥機(jī)場巴士4號線
        合肥機(jī)場巴士3號線
        合肥機(jī)場巴士3號線
        合肥機(jī)場巴士2號線
        合肥機(jī)場巴士2號線
        合肥機(jī)場巴士1號線
        合肥機(jī)場巴士1號線
      4. 短信驗證碼 酒店vi設(shè)計 deepseek 幣安下載 AI生圖 AI寫作 aippt AI生成PPT 阿里商辦

        關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

        Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
        ICP備06013414號-3 公安備 42010502001045

        主站蜘蛛池模板: 国产福利电影一区二区三区,免费久久久久久久精 | 日韩精品福利视频一区二区三区| 一区二区三区免费视频播放器| 秋霞鲁丝片一区二区三区| 无码精品久久一区二区三区| 久久精品国产一区二区三区 | 中文字幕一区二区三区视频在线| 99久久国产精品免费一区二区| 中文字幕久久久久一区| 无码精品一区二区三区免费视频| 精品无码日韩一区二区三区不卡| bt7086福利一区国产| 精品亚洲福利一区二区| 国产在线视频一区| 亚洲宅男精品一区在线观看| 国产主播一区二区三区| 国产成人高清精品一区二区三区| 人妻无码久久一区二区三区免费| 无码日韩精品一区二区免费| 国产美女视频一区| 性色av无码免费一区二区三区| 精品人妻一区二区三区毛片| 亚洲视频在线一区| 日韩精品一区二区三区在线观看| 国产综合精品一区二区三区| 久久精品无码一区二区三区不卡 | 国产一区二区三区免费观看在线| 国产福利微拍精品一区二区| 天海翼一区二区三区高清视频| 熟女性饥渴一区二区三区| 在线电影一区二区三区| 国产a∨精品一区二区三区不卡 | 日韩精品一区二区三区视频| ...91久久精品一区二区三区| 日韩精品一区二区三区不卡| 亚洲一区二区三区国产精华液| 国产亚洲3p无码一区二区| 日韩久久精品一区二区三区 | 国产中文字幕一区| 中文字幕一区日韩精品| 精品视频一区二区三区免费|